default search action
Hiroki Takakura
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Hiroki Takakura:
Editor's Message to Special Issue of "Young Researchers' Papers". J. Inf. Process. 32: 297 (2024) - [c64]Xiaoyuan Liu, Yang Xu, Jia Liu, Hiroki Takakura, Xiaoying Liu, Kechen Zheng, Norio Shiratori:
Multi-Armed Bandit-Based Secure Routing in Air-Ground Integrated Networks. WCNC 2024: 1-6 - [i2]Mikihiro Kasahara, Taiki Oka, Vincent Taschereau-Dumouchel, Mitsuo Kawato, Hiroki Takakura, Aurelio Cortese:
Generative AI-based closed-loop fMRI system. CoRR abs/2401.16742 (2024) - 2023
- [j11]Masaru Kitsuregawa, Shigeo Urushidani, Kazutsuna Yamaji, Hiroki Takakura, Ichiro Hasuo, Imari Sato, Fuyuki Ishikawa, Isao Echizen, Kensaku Mori:
Activities of National Institute of Informatics in Japan. Commun. ACM 66(7): 58-63 (2023) - [c63]Shohei Hiruta, Itaru Hosomi, Hirokazu Hasegawa, Hiroki Takakura:
Security Operation Support by Estimating Cyber Attacks Without Traffic Decryption. COMPSAC 2023: 1127-1132 - [c62]Shanshan Zhang, Yang Xu, Jia Liu, Hiroki Takakura, Lyu Chen, Norio Shiratori:
Bandwidth Allocation for Low-Latency Wireless Federated Learning: An Evolutionary Game Approach. ICC 2023: 1628-1633 - [c61]Honggang He, Yang Xu, Jia Liu, Hiroki Takakura, Zhao Li, Norio Shiratori:
Double-Sided Auction based Data-Energy Trading Architecture in Internet of Vehicles. WCNC 2023: 1-6 - 2022
- [j10]Jia Liu, Yang Xu, Yulong Shen, Hiroki Takakura, Xiaohong Jiang, Tarik Taleb:
Buffer Space Management in Intermittently Connected Internet of Things: Sharing or Allocation? IEEE Internet Things J. 9(13): 10961-10977 (2022) - [c60]Meng Xie, Jia Liu, Hiroki Takakura, Yang Xu, Zhao Li, Norio Shiratori:
Incentive Routing Design for Covert Communication in Multi-hop Decentralized Wireless Networks. GLOBECOM 2022: 49-54 - [c59]Yang Xu, Jia Liu, Hiroki Takakura, Zhao Li, Yusheng Ji, Norio Shiratori:
Stackelberg Game-based Secure Communication in SWIPT-enabled Relaying Systems. ICC 2022: 1462-1467 - [c58]Yingtao Zhou, Hirokazu Hasegawa, Hiroki Takakura:
A Resource Importance Estimation Method Based on Proximity of Hierarchical Position. ICISS 2022: 83-89 - [c57]Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura:
Cyber Attack Stage Tracing System based on Attack Scenario Comparison. ICISSP 2022: 587-594 - 2021
- [j9]Ruo Ando, Youki Kadobayashi, Hiroki Takakura:
Choice of parallelism: multi-GPU driven pipeline for huge academic backbone network. Int. J. Parallel Emergent Distributed Syst. 36(6): 609-622 (2021) - [c56]Hiroki Kashiwazaki, Hiroki Takakura, Shinji Shimojo:
An Evaluation of Stochastic Quantitative Resilience Index Based on SLAs of Communication Lines. COMPSAC 2021: 1449-1454 - [c55]Jianbo Shao, Yang Xu, Jia Liu, Hiroki Takakura, Zhao Li, Xuewen Dong:
On Strategic Interactions in Blockchain Markets: A Three-stage Stackelberg Game Approach. GLOBECOM 2021: 1-6 - [c54]Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura:
Incident Response Support System for Multi-Located Network by Correlation Analysis of Individual Events. ICISS 2021: 1-6 - [c53]Tomohiro Noda, Hirokazu Hasegawa, Hiroki Takakura:
Assessment System for Residual Risks of Information Leakage in Incident Countermeasures. ICISS 2021: 41-46 - [c52]Hirokazu Hasegawa, Hiroki Takakura:
A Dynamic Access Control System based on Situations of Users. ICISSP 2021: 653-660 - [c51]Hiroki Kashiwazaki, Hiroki Takakura, Shinji Shimojo:
A Proposal of Stochastic Quantitative Resilience Index Based on SLAs for Communication Lines. ICOIN 2021: 143-148 - [i1]Ruo Ando, Youki Kadobayashi, Hiroki Takakura:
Choice of Parallelism: Multi-GPU Driven Pipeline for Huge Academic Backbone Network. CoRR abs/2106.12863 (2021) - 2020
- [c50]Hiroki Kashiwazaki, Hiroki Takakura, Shinji Shimojo:
A Quantitative Evaluation of a Wide-Area Distributed System with SDN-FIT. COMPSAC 2020: 607-612
2010 – 2019
- 2019
- [j8]Daichi Hasumi, Shigeyoshi Shima, Hiroki Takakura:
SPINZ: A Speculating Incident Zone Systemfor Incident Handling. J. Cyber Secur. Mobil. 8(3): 341-364 (2019) - [c49]Yo Kanemoto, Kazufumi Aoki, Makoto Iwamura, Jun Miyoshi, Daisuke Kotani, Hiroki Takakura, Yasuo Okabe:
Detecting Successful Attacks from IDS Alerts Based On Emulation of Remote Shellcodes. COMPSAC (2) 2019: 471-476 - [c48]Yuya Sato, Hirokazu Hasegawa, Hiroki Takakura:
Construction of Secure Internal Networks with Communication Classifying System. ICISSP 2019: 552-557 - [c47]Hiroki Kashiwazaki, Hiroki Takakura, Shinji Shimojo:
Resilience Evaluations of a Wide-area Distributed System with a SDN-FIT system. ICT-DM 2019: 1-8 - [c46]Shohei Hiruta, Satoshi Ikeda, Shigeyoshi Shima, Hiroki Takakura:
IDS Alert Priority Determination Based on Traffic Behavior. IWSEC 2019: 189-206 - [c45]Hiroki Takakura:
Resilient Mechanisms for Reliable Digital Health Services. SERVICES 2019: 248-249 - [e6]Vladimir Getov, Jean-Luc Gaudiot, Nariyoshi Yamai, Stelvio Cimato, J. Morris Chang, Yuuichi Teranishi, Ji-Jiang Yang, Hong Va Leong, Hossain Shahriar, Michiharu Takemoto, Dave Towey, Hiroki Takakura, Atilla Elçi, Susumu Takeuchi, Satish Puri:
43rd IEEE Annual Computer Software and Applications Conference, COMPSAC 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 1. IEEE 2019, ISBN 978-1-7281-2607-4 [contents] - [e5]Vladimir Getov, Jean-Luc Gaudiot, Nariyoshi Yamai, Stelvio Cimato, J. Morris Chang, Yuuichi Teranishi, Ji-Jiang Yang, Hong Va Leong, Hossain Shahriar, Michiharu Takemoto, Dave Towey, Hiroki Takakura, Atilla Elçi, Susumu Takeuchi, Satish Puri:
43rd IEEE Annual Computer Software and Applications Conference, COMPSAC 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 2. IEEE 2019, ISBN 978-1-7281-2607-4 [contents] - 2018
- [c44]Hossain Shahriar, Hiroki Takakura, Michiharu Takemoto, Dave Towey:
Message from the Fast Abstract Co-chairs. COMPSAC (1) 2018: 780 - [c43]Daichi Hasumi, Shigeyoshi Shima, Hiroki Takakura:
Speculating Incident Zone System on Local Area Networks. WTMC@SIGCOMM 2018: 40-45 - [e4]Sorel Reisman, Sheikh Iqbal Ahamed, Claudio Demartini, Thomas M. Conte, Ling Liu, William R. Claycomb, Motonori Nakamura, Edmundo Tovar, Stelvio Cimato, Chung-Horng Lung, Hiroki Takakura, Ji-Jiang Yang, Toyokazu Akiyama, Zhiyong Zhang, Md. Kamrul Hasan:
2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018, Tokyo, Japan, 23-27 July 2018, Volume 1. IEEE Computer Society 2018, ISBN 978-1-5386-2667-2 [contents] - [e3]Sorel Reisman, Sheikh Iqbal Ahamed, Claudio Demartini, Thomas M. Conte, Ling Liu, William R. Claycomb, Motonori Nakamura, Edmundo Tovar, Stelvio Cimato, Chung-Horng Lung, Hiroki Takakura, Ji-Jiang Yang, Toyokazu Akiyama, Zhiyong Zhang, Md. Kamrul Hasan:
2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018, Tokyo, Japan, 23-27 July 2018, Volume 2. IEEE Computer Society 2018 [contents] - 2017
- [j7]Hiroki Takakura:
Editor's Message to Special Issue of Applications and the Internet in Conjunction with Main Topics of COMPSAC 2016. J. Inf. Process. 25: 755 (2017) - [c42]Takashi Kurimoto, Shigeo Urushidani, Hiroshi Yamada, Kenjiro Yamanaka, Motonori Nakamura, Shunji Abe, Kensuke Fukuda, Michihiro Koibuchi, Hiroki Takakura, Shigeki Yamada, Yusheng Ji:
SINET5: A low-latency and high-bandwidth backbone network for SDN/NFV Era. ICC 2017: 1-7 - [c41]Hideki Ogawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura, Mitsuaki Akiyama, Takeshi Yagi:
Malware originated HTTP traffic detection utilizing cluster appearance ratio. ICOIN 2017: 248-253 - [c40]Jia Liu, Yang Xu, Ruo Ando, Hiroki Takakura, Yifei Xu:
Resource Allocation for Throughput Optimization in Buffer-Limited Mobile Ad Hoc Networks. NaNA 2017: 80-86 - [e2]Sorel Reisman, Sheikh Iqbal Ahamed, Claudio Demartini, Thomas M. Conte, Ling Liu, William R. Claycomb, Motonori Nakamura, Edmundo Tovar, Stelvio Cimato, Chung-Horng Lung, Hiroki Takakura, Ji-Jiang Yang, Toyokazu Akiyama, Zhiyong Zhang, Md. Kamrul Hasan:
41st IEEE Annual Computer Software and Applications Conference, COMPSAC 2017, Turin, Italy, July 4-8, 2017. Volume 1. IEEE Computer Society 2017, ISBN 978-1-5386-0367-3 [contents] - [e1]Sorel Reisman, Sheikh Iqbal Ahamed, Claudio Demartini, Thomas M. Conte, Ling Liu, William R. Claycomb, Motonori Nakamura, Edmundo Tovar, Stelvio Cimato, Chung-Horng Lung, Hiroki Takakura, Ji-Jiang Yang, Toyokazu Akiyama, Zhiyong Zhang, Md. Kamrul Hasan:
41st IEEE Annual Computer Software and Applications Conference, COMPSAC 2017, Turin, Italy, July 4-8, 2017. Volume 2. IEEE Computer Society 2017 [contents] - 2016
- [c39]Shohei Hiruta, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura, Takeshi Yagi, Mitsuaki Akiyama:
Evaluation on Malware Classification by Session Sequence of Common Protocols. CANS 2016: 521-531 - [c38]Bhavani Thuraisingham, Dianxiang Xu, Hiroki Takakura, Mohammad Zulkernine, Elisa Bertino:
Message from the SEPT Organizing Committee. COMPSAC 2016: 399 - [c37]Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura:
An Automated ACL Generation System for Secure Internal Network. COMPSAC Workshops 2016: 559-564 - [c36]Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura:
An incident response support system based on seriousness of infection. ICOIN 2016: 69-74 - [c35]Takashi Kurimoto, Shigeo Urushidani, Hiroshi Yamada, Kenjiro Yamanaka, Motonori Nakamura, Shunji Abe, Kensuke Fukuda, Michihiro Koibuchi, Yusheng Ji, Hiroki Takakura, Shigeki Yamada:
A fully meshed backbone network for data-intensive sciences and SDN services. ICUFN 2016: 909-911 - 2015
- [c34]Bhavani Thuraisingham, Dianxiang Xu, Hiroki Takakura, Mohammad Zulkernine, Elisa Bertino:
Message from SEPT Symposium Organizing Committee. COMPSAC 2015: 421 - [c33]Yang Zhong, Hiroshi Asakura, Hiroki Takakura, Yoshihito Oshima:
Detecting Malicious Inputs of Web Application Parameters Using Character Class Sequences. COMPSAC 2015: 525-532 - [c32]Hyoyoung Lim, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura:
Malware Classification Method Based on Sequence of Traffic Flow. ICISSP 2015: 230-237 - 2014
- [c31]Soshi Hirono, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura:
Development of a Secure Traffic Analysis System to Trace Malicious Activities on Internal Networks. COMPSAC 2014: 305-310 - [c30]Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura:
A Countermeasure Recommendation System against Targeted Attacks with Preserving Continuity of Internal Networks. COMPSAC 2014: 400-405 - [c29]Shohei Araki, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura:
Unknown Attack Detection by Multistage One-Class SVM Focusing on Communication Interval. ICONIP (3) 2014: 325-332 - [c28]Manabu Watanabe, Hiroki Takakura, Chinatsu Yonezawa, Yasuhiro Yoshikawa, Masanobu Shimada:
Estimation of cause of ice jam flooding in sub-arctic regions using PALSAR full polarimetry data. IGARSS 2014: 843-846 - 2013
- [j6]Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Koji Nakao:
Toward a more practical unsupervised anomaly detection system. Inf. Sci. 231: 4-14 (2013) - [c27]Yang Zhong, Hirofumi Yamaki, Yukiko Yamaguchi, Hiroki Takakura:
ARIGUMA Code Analyzer: Efficient Variant Detection by Identifying Common Instruction Sequences in Malware Families. COMPSAC 2013: 11-20 - 2012
- [c26]Kazuya Kishimoto, Kenji Ohira, Yukiko Yamaguchi, Hirofumi Yamaki, Hiroki Takakura:
An Adaptive Honeypot System to Capture IPv6 Address Scans. CyberSecurity 2012: 165-172 - [c25]Naoya Kitagawa, Hiroki Takakura, Tsunehiko Suzuki:
An anti-spam method via real-time retransmission detection. ICON 2012: 382-388 - [c24]Yang Zhong, Hirofumi Yamaki, Hiroki Takakura:
A Malware Classification Method Based on Similarity of Function Structure. SAINT 2012: 256-261 - [c23]Masaaki Sato, Hirofumi Yamaki, Hiroki Takakura:
Unknown Attacks Detection Using Feature Extraction from Anomaly-Based IDS Alerts. SAINT 2012: 273-277 - 2011
- [c22]Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Masashi Eto, Daisuke Inoue, Koji Nakao:
Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation. BADGERS@EuroSys 2011: 29-36 - [c21]Yang Zhong, Hirofumi Yamaki, Hiroki Takakura:
A grid-based clustering for low-overhead anomaly intrusion detection. NSS 2011: 17-24 - [c20]Moriteru Ishida, Hiroki Takakura, Yasuo Okabe:
High-Performance Intrusion Detection Using OptiGrid Clustering and Grid-Based Labelling. SAINT 2011: 11-19 - [c19]Kazuya Kishimoto, Hirofumi Yamaki, Hiroki Takakura:
Improving Performance of Anomaly-Based IDS by Combining Multiple Classifiers. SAINT 2011: 366-371 - 2010
- [j5]Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Daisuke Inoue, Masashi Eto, Koji Nakao:
A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data. IEICE Trans. Inf. Syst. 93-D(9): 2544-2554 (2010)
2000 – 2009
- 2009
- [j4]Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Yongjin Kwon:
Unsupervised Anomaly Detection Based on Clustering and Multiple One-Class SVM. IEICE Trans. Commun. 92-B(6): 1981-1990 (2009) - 2008
- [j3]Jungsuk Song, Kenji Ohira, Hiroki Takakura, Yasuo Okabe, Yongjin Kwon:
A Clustering Method for Improving Performance of Anomaly-Based Intrusion Detection System. IEICE Trans. Inf. Syst. 91-D(5): 1282-1291 (2008) - [c18]Jungsuk Song, Hiroki Takakura, Yongjin Kwon:
A Generalized Feature Extraction Scheme to Detect 0-Day Attacks via IDS Alerts. SAINT 2008: 55-61 - 2007
- [c17]Jungsuk Song, Hayato Ohba, Hiroki Takakura, Yasuo Okabe, Kenji Ohira, Yongjin Kwon:
A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts. ASIAN 2007: 247-253 - [c16]Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Yongjin Kwon:
A Robust Feature Normalization Scheme and an Optimized Clustering Method for Anomaly-Based Intrusion Detection System. DASFAA 2007: 140-151 - 2006
- [j2]Takayuki Itoh, Hiroki Takakura, Atsushi Sawada, Koji Koyamada:
Hierarchical Visualization of Network Intrusion Detection Data. IEEE Computer Graphics and Applications 26(2): 40-47 (2006) - 2003
- [c15]Ryong Lee, Hironori Shiina, Taro Tezuka, Yusuke Yokota, Hiroki Takakura, Yongjin Kwon, Yahiko Kambayashi:
Map-Based Range Query Processing for Geographic Web Search Systems. Digital Cities 2003: 274-283 - [c14]Ryong Lee, Hironori Shiina, Hiroki Takakura, Yongjin Kwon, Yahiko Kambayashi:
Optimization of geographic area to a Web page for two-dimensional range query processing. WISE Workshops 2003: 9-17 - 2002
- [c13]Ryong Lee, Hiroki Takakura, Yahiko Kambayashi:
Visual Query Processing for GIS with Web Contents. VDB 2002: 171-185 - [c12]Naoharu Yamada, Ryong Lee, Yahiko Kambayashi, Hiroki Takakura:
Classification of Web Pages with Geographic Scope and Level of Details for Mobile Cache Management. WISE Workshops 2002: 22-29 - [c11]Yohsuke Inoue, Ryong Lee, Hiroki Takakura, Yahiko Kambayashi:
Web Locality Based Ranking Utilizing Location Names and Link Structure. WISE Workshops 2002: 56-63 - [c10]Ryong Lee, K. Goshima, Yahiko Kambayashi, Hiroki Takakura:
Caching Schema for Mobile Web information Retrieval. WebDyn@WWW 2002: 110-117 - 2001
- [c9]Taro Tezuka, Ryong Lee, Yahiko Kambayashi, Hiroki Takakura:
Web-Based Inference Rules for Processing Conceptual Geographical Relationships. WISE (2) 2001: 14-24
1990 – 1999
- 1999
- [c8]Hiroki Takakura, Yutaka Banjou, Yahiko Kambayashi:
Visual User Interface for Spatial Databases Combined with Landscape Images and Sensors. DANTE 1999: 237-246 - [c7]Toshihiko Hamano, Hiroki Takakura, Yahiko Kambayashi:
Organization of Mobile Networks under Privacy Constraints. ICSC 1999: 317-322 - 1998
- [c6]Toshihiko Hamano, Hiroki Takakura, Yahiko Kambayashi:
A Dynamic Navigation System Based on User's Geographical Situation. ER Workshops 1998: 368-379 - 1997
- [c5]Ken'ichi Horikawa, Masatoshi Arikawa, Hiroki Takakura, Yahiko Kambayashi:
Dynamic Map Synthesis Utilizing Extended Thesauruses and Reuse of Query Generation Process. ACM-GIS 1997: 9-14 - 1994
- [j1]Hiroki Takakura, Yahiko Kambayashi:
Design and performance evaluation of flash memory back-up systems. Syst. Comput. Jpn. 25(7): 39-47 (1994) - 1993
- [c4]Hiroki Takakura, Yahiko Kambayashi:
A Design of a Transparent Backup System Using a Main Memory Database. DASFAA 1993: 178-185 - [c3]Yahiko Kambayashi, Hiroki Takakura, Shintaro Meki:
Data Structure and Algorithms for New Hardware Technology. FODO 1993: 164-196 - [c2]Hiroki Takakura, Yahiko Kambayashi:
Continuous Backup Systems Utilizing Flash Memory. ICDE 1993: 439-446 - 1991
- [c1]Yahiko Kambayashi, Hiroki Takakura:
Realization of Continuously Backed-up RAMs for High-Speed Database Recovery. DASFAA 1991: 236-242
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-26 21:39 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint